Dominating Set and Network Coding-based Routing in Wireless Mesh Networks

Size: px
Start display at page:

Download "Dominating Set and Network Coding-based Routing in Wireless Mesh Networks"

Transcription

1 Domnatng Set and Network Codng-based Routng n Wreless Mesh Networks Jng Chen, Kun He, Ruyng Du, Mnghu Zheng, Yang Xang, Senor Member, IEEE, Quan Yuan Abstract Wreless mesh networks are wdely appled n many felds such as ndustral controllng, envronmental montorng and mltar y operatons. Network codng s promsng technology that can mprove the performance of wreless mesh networks. In partcular, network codng s sutable for wreless mesh networks as the fxed backbone of wreless mesh s usually unlmted energy. However, codng collson s a severe problem affectng network performance. To avod ths, routng should be effectvely desgned wth an optmum combnaton of codng opportunty and codng valdty. In ths paper, we propose a Connected Domnatng Set (CDS)-based and Flow-orented Codng-aware Routng (CFCR) mechansm to actvely ncrease potental codng opportuntes. Our work provdes two maor contrbutons. Frst, t effectvely deals wth the codng collson problem of flows by ntroducng the nformaton conformaton process, whch effectvely decreases the falure rate of decodng. Secondly, our routng process consders the beneft of CDS and flow codng smultaneously. Through formalzed analyss of the routng parameters, CFCR can choose optmzed routng wth relable transmsson and small cost. Our evaluaton shows CFCR has a lower packet loss rato and hgher throughput than exstng methods, such as Adaptve Control of Packet Overhead n XOR Network Codng (ACPO), or Dstrbuted Codng-Aware Routng (DCAR). Index Terms Network codng, domnatng Set, WMNs 1. INTRODUCTION N etwork codng has ganed sgnfcant momentum after t was frst proposed by Ahlswede et al [8]. Many researchers consder t effcent technology for wred and wreless networks to mprove network performance [1]. Network codng can remarkably ncrease network throughput dependng on certan factors [2], such as convergence of data flows or codng opportunty. Some exstng schemes passvely wat for codng opportuntes and do not suffcently consder the nfluence of routng. Recently t was dscovered network performance can be further optmzed f the routng s desgned n consderaton of codng opportuntes. Ths s called codng-aware routng [3]. Most self-organzed networks have the characterstcs of energy lmtaton and node moblty. As a result, desgners are nclned to dstrbute the flow of data to dfferent routng to make sure energy consumpton s balanced [4]. However, n wreless mesh networks, partcularly wth fxed backbone, the locatons of nodes are statc and energy s unlmted. The more the data flow converges to a node, the greater the codng beneft. Snce a Connected Domnatng Set (CDS) can effcently cover the network topology [5], domnatng J.Chen, K. He, R.Y.Du are wth the Computer School, Wuhan Unversty, Chna. E-mal: chenng@whu.edu.cn. M.Z heng s wth the Department of Computer Scence, Hube Unversty for Natonaltes, Chna Y.X ang s wth the School of Informaton Technology, Deakn Unversty, Burwood, VIC 3125, Australa. Q. Yuan s wth the Department of Math and Computer Scence, Unversty of Texas-Perman Basn, TX, USA Manuscrpt receved on the date of submsson. nodes are a good choce to converge data flows [6]. In addton, t has been noted that codng collson caused by mult-hop transmsson of data flows [7] can have a sgnfcant mpact on effcent codng. In ths paper, we propose a CDS-based and Flow-orented Codng-aware Routng (CFCR) mechansm to mprove the throughput of wreless mesh networks. The maor contrbutons of ths paper nclude two components. Frst, accordng to features of the fxed backbone and unlmted energy, CFCR constructs the approxmate Mnmum Connected Domnatng Set (MCDS), and can choose domnatng nodes to effectvely ncrease codng opportuntes. Unlke exstng routngs based on CDS, we defne CDS routng as the routng whch ncludes Domnatng des (DNs). We consder that f all nodes n routng are selected from CDS, t wll possbly nduce the problem of codng collson. As a result, CFCR takes DNs nto account frst, and then consders normal nodes as canddates for DNs f a codng collson s lkely. Hence, n CFCR, the best stuaton s f all nodes n routng are DNs and the worst stuaton s f all nodes n routng are normal nodes. Compared wth exstng algorthms based on CDS, CFCR s more flexble and practcal. Secondly, consderng the requrement of mult-hop codng-aware, we desgn an algorthm to confrm potental codng opportuntes n routng, thus guaranteeng the avalablty of network codng and mprovng codng effcency and relablty. Most researchers want to fnd optmal schemes to maxmze codng opportuntes. However, n practce, more codng opportuntes does not mean better performance. If flows

2 excessvely converge n some specfc routes or nodes, the codng collson wll be marked and the performance wll be degraded, such as throughput and packet loss rato. In ths paper, CFCR fnds a balance between codng opportuntes and collsons by the confrmaton process of network codng. CFCR ntally detects alternatve routngs as classcal on-demand routng. Then, t excludes routngs wth codng collson usng the confrmaton process. Fnally, the routng wth the most metrc beneft s selected. Because estmatons of the domnatng node and codng opportunty are mportant factors n routng selecton, we analyze these two problems before descrbng our routng protocol. The rest of ths paper s organzed as follows. The second secton presents related work about network codng and codng awareness routng of wreless networks. The soluton method of CDS, and the defnton of CDS routng are ntroduced n Secton 3. Secton 4 analyzes the condton of codng awareness. CDS-based and flow-orented codng aware routng s proposed n Secton 5. Secton 6 presents the smulaton results and analyzes the performance of codng opportunty, packet loss rato and throughput. A summary of ths paper and future work are descrbed n Secton RELATED WORK Network codng was frst proposed by Ahlswede et al. [8]. Ths research hghlghted a novel drecton for mprovng network throughput, and as a result, t has attracted sgnfcant attenton. In 23, L et al. successfully proved lnear codng could acheve maxmum capacty n multcastng [9]. Koetter and Medard proposed the polynomal tme algorthm of encodng and decodng [1], and T. Ho et al. extended ths algorthm to nclude random codng [11]. Due to open wreless channels, many researchers found network codng more sutable to wreless networks, and therefore proposed a number of schemes [12,13]. S. Katt desgned an orgnal wreless network forwardng framework called COPE [14], whch combned network codng theory and practcal requrements. COPE can be ntegrated nto an exstng network protocol stack, and can work together wth TCP and UDP [15]. Besdes COPE, there are stll many creatve XOR-based schemes. Tebatso Nage proposed a new adaptve scheme called ACPO [15] whose obectve s to adaptvely control the watng tme for montorng packets stored n a buffer. The am of ths scheme s to acheve a tradeoff between throughput and overhead. The work n [24] consdered an algorthm wth a lower complexty than COPE, and desgned ts optmal scheduler consderng Phy and MAC constrants. [25] consdered parwse Inter-sesson Network Codng (IRNC) whch allows codng over multhops, however t only lmts codng between two orgnal packets. It s desgned to correspond wth the optmal scheduler and rate controller. The work n [27] exploted the use of drectonal antennas to network codng-based broadcastng to further reduce energy consumpton. The XOR-based and Reed-Solomon based codng algorthms were desgned by determnstc broadcast approaches to reduce the number of transmssons n the network n [28]. Abdallah Khreshah et al consdered energy effcency n lossy wreless networks wth XOR-based IRNC, and provded a heurstc to solve the IRNC problem [26]. Further more, they proposed a dfferent approach by lookng at flows or batches nstead of ndvdual packets n [29]. All of these works have made an mportant contrbuton to mprovng the XOR-based network codng algorthm. However, ther man focus s to decompose the network nto a superposton of small two-hop networks for network codng. Even though a two-hop network s more convenent for XOR-based network codng, t remans an open problem to dscover an algorthm that wll fnd an optmal superposton. If the routng protocol was aware of codng opportuntes, ths could lead to mprovng the performance of wreless networks. Based on the COPE approach, the problem of codng-aware routng and schedulng was studed by [23]. Sudpta Sengupta e propose XOR-based codng-aware routng called CA-PATH-CODE, whch s the shortest path routng wth network codng. However, the formulaton n [23] nvolves lnear programmng computed centrally. J. Le et al. proposed Dstrbuted Codng-Aware Routng (DCAR) whch can fnd avalable routng and potental codng opportuntes [16]. They defned generalzed codng condtons (GCCs) that made the network codng scheme more practcal. Utlzng the GCCs, the algorthm was proposed to detect codng opportuntes out of the two-hop range. In addton, they also dscussed the Codng-aware Routng Metrc (CRM) that can help estmate the performance of routng. B.Guo et al. formally establshed codng condtons for a general scenaro [17]. They systematcally analyzed possble codng scenaros, and developed generalzed codng condtons to ensure decodng ablty at the destnatons. These two papers pcked smlar routes that satsfed the codng condton. However, they pad lttle attenton to selectng sutable nodes to ncrease codng opportuntes and avod codng collson. S. Wang et al. desgned a scheme that consdered the connected domnatng node along wth network codng n an ad hoc network when routes were chosen [18]. Though t does have some advantages, they do not consder that multple codng nodes mght exst along a path, and that multple flows mght ntersect at one node nducng a codng collson. Furthermore, compared wth the moblty of ad hoc networks, a wreless mesh network wth fxed backbone s more sutable for utlzng the connected domnatng node to ncrease codng opportuntes [19]. In our opnon, practcal effcent routng should explot codng opportuntes wth domnatng nodes, as well as avodng a codng collson. If the domnatng nodes n the backbone were selected as the codng nodes wthout nterference, t s possble to obtan better performance.

3 3. THE CONNECTED DOMINATING SET ROUTING To descrbe CFCR step by step, we ntroduce the algorthm to select CDS, and provde the defnton for CDS routng n ths secton. The wreless mesh network s treated as a graph G ( V, E),whereV s the vertex set, and E s the edge set. A Connected Domnatng Set (CDS) of a graph G s a set D of vertces wth two propertes: (1) Any node n D can reach any other node n D by a path that stays entrely wthn D. That s, D nduces a connected subgraph of G. (2) Every vertex n G ether belongs to D or s adacent to a vertex n D. That s, D s a domnatng set of G. Each node n graph G ( V, E) wll be marked as mv (). Where v V.If v s a domnatng node, mv () T,otherwse mv () F. Intally, all nodes are set as F. V ' denotes the marked domnatng node set whle V' { uu Vmu, () T} G' GV ( ') ndcates the connected graph consstng of the domnatng nodes. Nv ( ) denotes the sngle-hop neghbors of node v whle Nv () { (, u vu) E}. Nv [] presents the set of node v, and ts sngle hop neghbors, whch s Nv [] Nv () {} v. Please refer to the supplement fle n Appendx A for markng steps and rules. In a strct sense, CDS routng s routng where all nodes n the path are domnatng nodes except the source and destnaton node. For example, 3, 6, 7, 9, 12 are domnatng nodes n Fgure 1. If a source node s 15 and a destnaton node s 8, the routng 15->12->9->7->8 s CDS routng, and the routng 15->12->11->8 s not because node 11 s not a domnatng node. However, CFCR focuses on ncreasng codng opportuntes nduced by domnatng nodes. To gan more codng opportuntes as well as avod codng collson, t s not practcal that all nodes along the route are domnatng nodes. Hence, n ths paper, we defne CDS routng as routng that ncludes domnatng nodes. As a result, the routng 15->12->11->8 s CDS routng because t ncludes the domnatng node 12 even though t does not satsfy the strct defnton. 4. THE CONDITION OF CODING AWARENESS Accordng to dfferent standards, network codng can be dvded nto dfferent types, such as node orented or flow orented, nter-flow or ntra-flow, and XOR-based or non XOR-based network codng [17, 2]. COPE and ACPO are typcal node orented nter-flow XOR-based schemes. However, they have two lmtatons. Frst of all, nodes can only wat for a codng opportunty and cannot proactvely fnd t durng routng. Besdes, the network codng condton states the range must be less than two hops. However nter-flow network codng s more suted for a wreless mesh network wth multple flows. In ths paper, n order to mprove practcablty, our network codng algorthm s a flow orented, nter-flow, XOR-based type. As a scheme for flow codng, we analyze the codng condton n a mult-hop scenaro. Before analyzng the network codng condton, let us defne symbols. f ndcates a data flow. a f denotes node a belongs to the routng of data flow f whle the source node s s and the destnaton node s d. Na ( ) means the sngle-hop neghbor set of node a. For(, a f ) ndcates the forwardng nodes set of nodea n the routng of data flow f. Bac (, a f ) ndcates the backward nodes set of node a n the routng of data flow f. For example, n Fgure 2, For(3, f1) {1,2}, Bac (3, f 1) {4}, For (3, f 2) {5}, Bac(3, f2) {6,7}. Generally, f two flows ntersect n a node and satsfy the network codng condtons, the packets of flow can then be encoded, and transmtted by the crossng node. Fg. 2. Mult-hop codng awareness Codng condton: For the flow f 1 and f 2 whch ntersect at node c, f the followng condtons are satsfed, network codng s feasble [17]. (1) Exstng node d1 Baccf (, 1) whle d1ns () 2 s2forcf (, 2) or d1 Forcf (, 2) (2) Exstng node d2bacc (, f2) dns () sforcf (, ) or d2forcf (, 1) whle Fg. 1. The connected domnatng set and domnate routng 5. THE CDS-BASED AND FLOW-ORIENTED CODING-AWARE ROUTING (CFCR) IN A WIRELESS MESH NETWORK Generally, n a wreless mesh network, backbone nodes are statc wth unlmted energy. Hence, we can focus on mprovng performance.

4 5.1 The procedure of routng To assst understandng, we llumnate the routng procedure of CFCR n Fgure 3. To begn wth a node estmates whether t s the destnaton. Second, the destnaton node feeds back the RREP (Routng REPly) packet to the source node. Thrd, relay nodes udge whether they are domnatng nodes usng the algorthm n Secton 3 and whether they have codng opportunty usng the scheme n Secton 4. Fourth, routng wth the smallest value of CFCR s selected by the algorthm n Secton 5.4. The source node broadcasts RREQ The relay node udges whether t s a destnaton? Has the node receved the RREQ? Update the routng nformaton and broadcast the RREQ Yes The destnaton node sends RREP back accordng to RREQ Yes Drop RREQ The relay node udges whether t has potental codng opportunty The source node acheves the routng length and codng nformaton of each alternatve routng by RREP Does the alternatve routng nclude the potental codng node? Choose the shortest path The source node computes the CFCR value of each routng consderng CDS preference Send data va the routng wth smallest CFCR value Yes Yes Fg. 3. The procedure of CFCR Mark routng as alternatve routng The source node sends the confrmaton packet The relay nodes and destnaton node confrm the codng opportunty by flow state and routng nformaton The destnaton node udges whether the codng collson exsts 5.2 The confrm process of network codng Due to the possblty that dfferent flows may nterfere wth each other, the problem of codng collson does affect the performance of routng. Codng collson: When a flow ons the network, t selects the routng wth more codng opportunty whch satsfes the codng condton. However, due to excessve codng, the packets may not be decoded. Update routng nformaton and send t to the source node Yes Delete the potental codng node wth problem of alternatve routng Fg. 4. Multple potental codng nodes exst n the same routng As we know, the routng selecton process s launched va a source node n on-demand routng whch CFCR belongs to. When routng nformaton s sent backward from the destnaton node to the source node, the relay nodes can udge whether they are potental codng nodes [16]. For example, f flow f 1 and f 2 exst n fgure 4(a), R 1 s the potental codng node, and R 2 s not the potental codng node n the routng of flow f 3. Accordngly, f the stuaton occurs n Fgure 4(b), both R 1 and R 2 can potental codng nodes. As prevous analyss demonstrates, udgment of codng opportunty needs nformaton from relay nodes. However, f nformaton s added to the header of the RREQ (Routng REQuest) packet, the network load s observably ncreased by broadcastng. In order to satsfy the network codng condton wth mnmum network overload, we desgn a lghtweght confrmaton process explotng uncast to estmate whether the relay node s a potental codng node. As n Fgure 4(a), for example, there are two flows, f 1 and f 2. At some tme, flow f 3 ons the network. Accordng to the defnton n Secton 3, flow f 1 and f 3 satsfy the network codng condton n vew of node R1, and flow f 2 and f 3 satsfy the network codng condton n vew of node R 2. However, after node R 1 codes P 1 P 3, and broadcasts t, node R 2 receves P1 P, whch s not 3 the expected packet P 3. As a result, node R 2 XORs P 1 P 3 and P 2, and broadcasts P1P2 P3. In ths case, node D 2 cannot decode the packet and acheve P 2, due to excessve codng. In other words, flow f 3 nduces the codng collson problem. Fg. 5. The four steps n the confrm process Fgure 5 descrbes the nteractons between the source and destnaton node. In a sense, t s a smplfed verson of Fgure 3. There are four steps n Fgure 5

5 whch are RREQ, RREP, RC (Routng Confrmaton) and RC ACK (RC ACKnowlegement). In the RREQ and RREP process, the source node detects alternatve routes to the destnaton node wth potental codng nodes. Then, the source node sends uncast to the destnaton node by each alternatve routng n the RC process. In ths process, potental codng nodes n each route check whether there exsts any codng collson. After RC, ACKs provde feedback about the stuatons to the source node, and the source node then marks potental codng nodes as normal nodes f these nodes have the potental to cause a codng collson. From Fgure 5, we fnd the frst two steps are necessary n on-demand routng. The other two steps are dfferent wth exstng protocols such as DSR [21] and DCAR. It s worth notng that only RREQ needs broadcastng, and the other three steps rely on uncastng. In addton, the last two steps are only executed n alternatve routng. These two steps am to verfy whether the potental codng node nduces codng collson at low cost. As a result, t can effectvely decrease the packet loss rato by reducng the possblty of decodng falure. If routng does not contan potental codng nodes, the last two steps are unnecessary and routng becomes normal on-demand routng. Flow Lstenng Codng opportunty de Flow Lstenng Codng opportunty de f 1 f 1 +f 3 f 1 +f 3 f 3 f 1, f 2 Wth f 1 R 1 R 2 D 3 (a) f 3 f 1 +f 3 f 3 f 2 +f 3 f 1 f 1 Wth f 1 Wth f 2 R 1 k R 2 (b) Fg. 6. Routng nformaton of the confrmaton process For example, from Fgure 4(a), there are two potental codng nodes (R 1 and R 2 ) n the alternatve routng of flow f 3 after RREP and RREQ. In step three, when RC reaches node R 1, we fnd the flow satsfes the network codng condton. However, when the RC arrves at node R 2, a codng collson occurs f the packet P 1 P 3 s encoded wth P 2. Hence, R 2 cannot be a potental codng node. As a result, the potental codng node n the alternatve routng of flow f 3 s R 1 after four steps, whle step three confrms the codng condton, and step four turns back acknowledgement. Fgure 6 presents the routng nformaton stored n a source node after the confrmaton process whch manly corresponds to step three and four. Fgure 6(a) and 6(b) demonstrate the stuaton n the examples of Fgure 4(a) and 4(b) respectvely. From Fgure 6, the source node can realze the stuaton of the flow, plus the lstenng and f 1, f 2 D 3 f 3 codng opportunty n relay nodes and the destnaton node. The lstenng nodes ndcate the nodes belongng to the lstenng range of the source node. Ths nformaton s very useful to help the source node select routes. To help destnaton and source nodes estmate, each node n routng should mantan some routng nformaton. Table 1 presents the routng nformaton of flow f 3 n Fgure 4(a). The ffth row n Table 1 ndcates whether t s CDS routng. The udgment method s descrbed n Secton 3. Furthermore, nodes must store a dfferent routng table for each flow that passes through them. In ths table, we also provde the recommended sze for each part. Hence, the storage overhead of each flow s approxmately 122 bts. TABLE 1 THE DATA STRUCTURE OF ROUTING INFORMATION Flow (8b) f 3 des n routng (48b) S 3 R 1 R 2 D 3 Flow state (48b) f 3 f 1 +f 3 f 1 +f 3 f 3 Lstenng nodes (16b) D 1 D 2 CDS routng (2b) True 5.3 The routng metrc of CFCR The obectve of our algorthm s to mprove mesh network performance, whch s measured by the length of path, the flow codng beneft, and the flow codng opportunty n routng. For example, n Fgure 1, routng 15->12->11->8 has three hops and the routng 15->12->9->7->8 has four hops. If the metrc s only related to the shortest path, the former s better. However, the domnatng node has more opportunty for codng. If certan flows, such as 17->9->1 and 13->12->16 on the network, the domnatng node wll save two transmssons. As a result, the throughput of routng 15->12->9->7->8 s hgher. As the backbone of a wreless mesh network s statc and energy s unlmted, the domnatng nodes are feasble for codng to optmze performance. We ntend to desgn the routng metrc that can present these factors unformly. 1. The flow codng beneft There are two factors that nfluence the codng beneft. One s the routng length, and the number of codng nodes n the routng. The other s the matchng degree of nteractve flows. (a) The routng codng beneft In order to descrbe ths more accurately and concsely, we frst defne some symbols. F { F,1 k} denotes the alternatve routes set of the new flow, whle k presents the number of alternatve routngs. For route F, ( F ) ndcates the codng beneft of the route. dnum( F ) denotes the decreased number of transmsson n routng

6 F. H( F) presents the hop number of route F between the source and destnaton node. Hmn mn H( F) 1 k ndcates the hop number of the shortest route. Regardless of data matchng, the queston remans as to how much beneft the codng node can produce. As we know, network codng s technology transmttng multple packets usng broadcastng to mprove performance. For example, one transmsson can be saved f two packets are coded. If we use ths analogy, n-1 transmssons can be saved f n packets are coded n a node. For the sake of smplfcaton, we consder the decreased transmsson number as the decreased hop number. For routng F, the number of flows through the codng node a s denoted by na ( ), whch can be computed from the flow state of routng nformaton. The total number of decreased hops s cnum( F ) n( a ), 1m whle m presents the number of codng nodes n routng F. As a result, f there are codng nodes n routng, the routng codng beneft s defned as follows: cnum( F ) (( a) n( a)). Ths means the routng 1 m codng beneft s presented as follows. ( F) ( ( a ) n( a )) ( H( F) H ) 1 m It should be noted the data quantty of the flow s not easy to compute. In ths paper, we adapt an approxmate method by the length of the buffer queue to estmate the matchng factor. In practce, CFCR only needs to compute the rato between the length of the codng node output queue Qa ( ), and the length of the source node packet queue Qs (). 1 Qa ( ) Qs ( ) Qa ( ) Qa ( ) Qs ( ) Qs () 2. The codng-aware routng metrc Based on prevous analyss, we fnd the more domnate nodes n routng, the more benefts receved. Accordng to our metrc, f there are two routes wth the same beneft, CFCR wll select the one wth more domnate nodes. The reason s these domnatng nodes may provde future codng opportuntes. Accordng to equaton (4) and (5), we can obtan mn (4) (5) CFCR( F) ( ) ( ( )) ( F) cuum( F) ( H( F) Hmn ) n( a) ( H( F) Hmn) H F a n a (1) 1 (b) Data matchng In the transmsson process of a data flow, other flows coded wth ths one may end sooner or later. As a result, some codng opportuntes dsappear, and the codng beneft of the data flow wll be lower than when computed wth equaton (1). Hence, consderng the data flow matchng problem, f the flow codng opportunty dsappears when one half of the data n flow has been sent, the routng codng beneft wll be defned as follows. ( F) n( a)/2 ( H( F) Hmn ) (2) 1 m 1 m Accordngly, the matchng factor ( a ), whch denotes the rato between the data quantty of old flow B old, and the data quantty of new flow B new, n codng node a s contnually modfed. 1 Bold Bnew Bold B (3) old Bnew Bnew Therefore, the actual decreased hop number s ( a ) n( a ). The total decreased hop number s m CFCR( F ) denotes the length of route F after the codng beneft s transformed. To encourage t to choose domnate nodes, we defne an ncentve factor. The value of s adustable, and s determned by the CDS routng preference of CFCR. As a result, the CFCR( F ) s defned as follows. H( F) ( ( a )* n( a )) F s not n CDS routng 1m CFCR( F ) * H( F) ( ( a )* n( a )) F s n CDS routng 1m CFCR metrc presents the path length, the codng beneft and opportunty. The metrc also reflects the stuaton of network resource occupaton. A smaller CFCR value ndcates lower consumpton of network resources n routng. In addton, the CFCR metrc has certan dfferences wth the codng beneft of routng ( F ) n equaton (4). The most obvous dfference s that ( F ) may be postve or negatve, but CFCR( F ) s always postve. If ( F ) s mnus, t means routng consumes more network resources than routng wthout domnatng (6)

7 nodes. If ( F ) s plus, t means the codng beneft of routng decreases the network resource consumpton. However, CFCR( F ) denotes the length of routng after transformaton, and no matter whether t s CDS routng, CFCR( F ) cannot be less than zero. The other dfference s the route wth the smallest CFCR( F ) wll be selected as the transmttng route. ( F ) only llumnates the beneft of a routng. Even f ( F ) s the largest, the consumpton of network resources may not be the smallest. Compared wth other metrcs of exstng codng-aware routng, the proposed metrc of CFCR has the followng characterstcs. (1) The metrc of CFCR s sutable for both CDS, mult-hop codng-aware routng and non-cds, non-codng routng. For the latter, the metrc of CFCR degenerates nto the number of hops. (2) As the source node needs enough nformaton to estmate whether a codng collson exsts, and how much the codng beneft s, the metrc can be calculated after all confrmaton packets return from the destnaton node, unless t s overtme. (3) The metrc of CFCR has good extendblty. For example, f the phenomenon of losng packets s serous, the expected transmsson count can also be consdered n the metrc. 5.4 The algorthm of routng selecton In our algorthm, when the source node receves all confrmaton packets, t excludes all non-codng routng except the shortest. It then computes each CFCR value of the alternatve routng, and selects the best routng wth the smallest CFCR value. The pseudocode for routng selecton s as follows. Algorthm1The selecton of routng Input:F,1 kfrom the confrmaton packets Output: The optmzaton routng F* F*= ; H mn =; CFCR*=; for =1; 1k; ++ / / Computng the shortest path Computng the value of H(F ) f H(F ) H mn then H mn = H(F ) end end for =1; 1k; ++ / / Computng CFCR CFCR(F )=; f(smn(f )) then CFCR(F )= H mn ; f (scds(f ) scode(f )) then f(scode(f )) then / / udgng whether t s alternatve routng CFCR(F )=H(F )- ( a n( )); end fscds(f ) then CDS routng 1 m a / / udgng whether t s CFCR(F )= CFCR(F ); End End f CFCR(F ) CFCR*then CFCR*= CFCR(F ); F*= F ; End End Return F* 6. SIMULATION RESULTS AND ANALYSIS In order to verfy the performance of CFCR, we utlze NS2 to smulate and analyze the results. ACPO [15] s an extended scheme of COPE [14], whch s a typcal scheme n network codng. The CA-PATH-CODE [23] and DCAR [16] are codng-aware routngs. CA-PATH-CODE s a centralzed algorthm and DCAR s a dstrbuted algorthm, wth a smlar routng selecton process to CFCR. Hence, we compare these three schemes wth our algorthm. Please refer to the supplement fle n Appendx B for topology and parameters of the smulaton. 6.1 The nfluence of CDS Through prevous analyss, we know CFCR tends to select the domnatng nodes n routng dscovery. However, f all flows converge to a certan domnatng node, there wll be a bottleneck n the network. As a result, CFCR wll balance some flows to routng ncludng normal nodes when the network traffc s heavy. To estmate the nfluence of the CDS metrc, we ndvdually smulate the CFCR algorthm wth and wthout the CDS metrc. Fgure 7(a) and 7(b) show the movement of total throughput wth dfferent flow rates n grd and random topology. Obvously, n both topologes, we fnd that CFCR wth a CDS metrc has a bgger total throughput. Ths means the flow centralzaton of the CDS metrc ncreases network codng opportuntes as a whole. Total throughput(mbps) N-CDS CDS Flow rate(kbps) Fg. 7(a). Flow rate vs the total throughput n grd topology

8 3.5 3 N-CDS CDS 6 5 DCAR CFCR ACPO CA-PATH-CODE Total throughput(mbps) Packet loss rato(%) Flow rate(kbps) Flow rate(kbps) Fg. 7(b). The flow rate vs total throughput n random topology On the other hand, there s an nterestng phenomena that does not always ncrease the total throughput. When the flow rate s low, the total throughput wth a dfferent metrc clmbs smoothly, and the dfference s small. When the flow rate ncreases, the total throughput grows quckly, and the dfference contnues to become larger. When the flow rate reaches a certan level, the total throughput fluctuates and decreases whle the dfference becomes smaller and smaller. The reason s the CDS metrc nduces opportuntes and nterference for network codng at the same tme. If the flow rate s too hgh, the nfluence of nterference s larger than the codng beneft. Fnally, f the flow rate s suffcently large, the new routng has to choose normal nodes. Ths means the throughput wll degrade, whch s the same as the scenaro wthout the CDS metrc. In addton to ths, because the number of selectable routes n the grd are fewer than n random topology, the dfference of total throughput s accordngly smaller, and reaches the fluctuaton and declne status qucker. 6.2 The effectve codng opportunty To present the effectve codng opportunty, we analyze the packet loss rato, encoded rato and the decoded rato respectvely. We compare the performance between DCAR, CFCR, ACPO and CA-PATH-CODE. Packet loss rato(%) DCAR CFCR ACPO CA-PATH-CODE Fg. 8(b). The flow rate vs the packet loss rato n random topology Fgure 8(a) and 8(b) show the packet loss rato of DCAR, CFCR, ACPO and CA-PATH-CODE wth dfferent flow rates n grd and random topology. From these fgures, we see the packet loss rato s lower n the CA-PATH-CODE and CFCR than n other algorthms. When the flow rate s n low speed, the packet loss rato of CA-PATH-CODE and CFCR mantans stablty at a very low level, whle the flow rate of DCAR and ACPO contnuously ascends. There are two reasons that result n packet loss. () Network congeston nduces the buffer to overflow wth nodes. () Encoded packets can t be decoded when they reach the destnaton node. Obvously, the loss of packets s not nduced by: () a low flow rate. Ths stuaton demonstrates the CA-PATH-CODE and CFCR can more effectvely guarantee the rato of packet decodng. When the flow rate ncreases, congeston leads to a hgher packet loss rato. Even though the CA-PATH-CODE can decrease codng nterference by routng selecton, t doesn t consder the stuaton of codng collson. As a result, the packet loss rato of the CA-PATH-CODE s hgher than CFCR when the flow rate reaches a threshold. The packet loss rato of CFCR rses from 4kbps n grd topology and 5kbps n random topology. Due to more optonal routngs n random topology, the packet loss rato can mantan a stable status for a longer perod of tme. The sucessful rato of decodng CFCR DCAR ACPO CA-PATH-CODE Flow rate(kbps).2 Fg. 8(a). The flow rate vs the packet loss rato n grd topology Grd(5x5) 25-node random Fg. 9. The comparson of successful decodng rato

9 Rato of encoded packet(%) CFCR DCAR ACPO CA-PATH-CODE Grd(5x5) Fg. 1. Comparson of the encodng rato 25-node random Accordngly, Fgure 9 presents the comparson of the successful decodng rato n four algorthms. Because ACPO only deals wth two-hop codng, the successful decodng rato of ACPO s the hghest. Due to the codng confrmaton process and consderaton of codng nterference, CFCR and CA-PA-CODE has a hgher successful decodng rato than DCAR. In order to evaluate the nfluence of the codng beneft, Fgure 1 ndcates the rato of encoded packets n CFCR, DCAR, ACPO and CA-PATH-CODE. te that DCAR and CFCR have the smlar codng opportunty and ACPO has the lowest opportunty. Because the goal of the three codng-aware routng algorthms s to fnd more codng opportuntes, they have a hgher encoded packet rato. In addton, the CA-PATH-CODE adapts to a tradeoff between routng flows close to each other n order to utlze codng opportuntes and away from each other to avod wreless nterference. Hence, t has the least number of encoded packets n each of the three schemes. The CDS metrc can help CFCR fnd more codng opportuntes. However, some opportuntes are dened n the confrmaton process of CFCR. Hence, the number of encoded packets s largest n DCAR. In addton, we can refer to the supplement fle n Appendx C for some addtonal smulaton results. Fnally, we lst a comparson of the ACPO, DCAR, CA-PATH-CODE and CFCR n Table 2. In order to dstngush effectveness, we defne 1 as the worst level and 3 as the best level. TABLE 2 COMPARISON BETWEEN THE THREE SCHEMES ACPO CA-PATH-CODE DCAR CFCR Codng type de orented Flow orented Flow orented Flow orented Algorthm type Centralzed Centralzed Dstrbuted Dstrbuted Routng protocol Informaton needed by relay nodes The routng path choosng metrc Network codng range Network codng opportunty Classcal routng such as DSR or AODV Sngle hop neghbor node lst; packets n the cache of sngle hop neghbors Routng length Codng aware routng Codng aware routng Codng aware and confrm routng wth CDS consdered Neghbor nodes lst and the data queues n ther cache; the data flows through tself Routng length, network codng beneft Neghbor nodes lst and the data queues n ther cache; the data flow s through tself Routng length, network codng beneft Neghbor nodes lst and the data queues n ther cache; the data flow s through tself Routng length, network codng beneft, CDS routng Tw o-hop Mult-hop Mult-hop Mult-hop rmal Many(1) Many(3) Many(2) Packet loss rato Low (1) Low (2) Hgh Low (3) Decodng rato Medum(3) Medum(2) Medum(1) Hgh Intalzaton Smp le Smp le Complex Complex Routng overhead Lght Medum(3) Medum(2) Medum(1) Network throughput rmal Hgh(2) Hgh(1) Hgh(3) 7. CONCLUSIONS AND FUTURE WORK In ths paper, we proposed a novel CDS-based and Flow-orented Codng-aware Routng (CFCR), whch focused on utlzng the characterstcs of the wreless mesh network to enhance performance. Our scheme selected the approprate codng node from the connected domnatng set. In order to solve the codng collson problem and decrease the packet loss rato, we desgned a method to confrm potental codng opportuntes n the process of route selecton. In partcular, we desgned the routng metrc to unformly present many factors such as length of routng, the beneft of network codng and codng opportuntes. Consderng the requrement n practce, our scheme was nclned to select domnatng

10 nodes but not ust ones lmted to connected domnatng sets. To optmze the beneft of CDS routng and flow codng, CFCR analyzes the routng metrcs usng a formalzed method, and verfes them by smulaton. The future work of CFCR s as follow s: (1) We wll research a more precse computng method to solve the problem of data flow matchng when computng the flow codng beneft. (2) We wll compare the advantage and dsadvantage of the flow-orented and node-orented methods. We beleve the hybrd method wll perform better because the node-orented codng method deals wth a small amount of data, and the flow-orented method deals wth a large amount of data. ACKNOWLEDGEMENTS Ths work was partally supported by the Natonal Natural Scence Foundaton of Chna under Grant , , , , and the Maor State Basc Research Development Program of Chna under Grant. 214CB346. REFERENCE [1] A. Khreshah, I. M. Khall and J. Wu, Dstrbuted network codng-based opportunstc routng for multcast, Proceedng of the 13th ACM Internatonal Symposum on Moble Ad Hoc N etworkng and Computng, pp , 212. [2] P. L, S. Guo, S. Yu, A.V. Vaslakos, An opportunstc feedng and routng protocol for relable multcast wth ppelned network codng, Proceedng of the IEEE INFOCOM. Orlando, FL, USA,pp. 1-18, 212. [3] J. Chen, T. L, R.Y. Du, Effcent Relable Opportunstc Network Codng Based on Hybrd Flow n Wreless Network, Chna Communcaton, pp , 211. [4] Z. Ln, L. Xu, D. Wang, J. Gao, A Colorng Based Backbone Constructon Algorthm n Wreless Ad Hoc Network, Proceedng of thegpc 26, pp , 26 [5] J. Wu, M. Carde, F. Da and S.H. Yang. Extended Domnatng Set and Its Applcatons n Ad Hoc Networks Usng Cooperatve Communcaton, IEEE Transactons on Parallel and Dstrbuted Systems, 17(8),pp , 26. [6] Q. Yuan, I. Carde, and J. Wu. An Effcent Predcton-Based Routng n Dsrupton-Tolerant Networks, IEEE Transactons on Parallel and Dstrbuted Systems, 23(1), pp , 212. [7] J. Wang, J.P. Wang, K.J. Lu, Y. Qan, B. Xao and N.J. Gu, Optmal Desgn of Lnear Network Codng for nformaton theoretcally secure uncast, Proceedng of the IEEE INFOCOM. Shangha, Chna, pp ,211. [8] R. Ahlswede, N. Ca, et al., Network nformaton flow, IEEE Transactons on Informaton Theory, 46(4),pp ,2. [9] S.-Y.R. L, R.W. Yeung, N. Ca, Lnear network codng, IEEE Trans Informaton Theory, 49(2),pp ,23. [1] R. Koetter, M. Medard, An algebrac approach to network codng, IEEE/ACM Trans. Networkng, 11, pp , 23. [11] T. Ho,M. MedardR. KoetterD. KargerM. EffrosJ. Shand B. Leong A random lnear network codng approach to multcast, IEEE Transactons on Informaton Theory, vol. 52,no.1, pp , 26. [12] S. Deb, M. Effros, T. Ho, D. R. Karger, R. Koetter, D. S. Lun, M. M edard, and N. Ratnakar, Network codng for wreless applcatons[r], A bref tutoral, In IWWAN, 25. [13] A. Ramamoorthy, J. Sh, and R. Wesel, On the capacty of network codng for wreless networks[r], In 41st Annual A llerton Conference on Communcaton Control and Computng, Oct. 23. [14] S. Katt,H. Rahul,W. Hu,D. Katab,M. Medard and J. Crowcroft, XORs n the arpractcal wreless network codng, IEEE/ACM Transactons on Networkng(TON ), vol. 16, no.3, pp , 28. [15] T. Nage, F. Rchard Yu and M. St-Hlare, Adaptve Control of Packet Overhead n XOR Network Codng, Proceedngs of Conference on IEEE Internatonal Conference on Communcatons (ICC 21), pp.1-5, 21. [16] J. Le, J. C. S. Lu, and D. M. Chu, DCAR: Dstrbuted codng-aware routng n wreless networks, IEEE Transactons on Moble Computng, vol. 9, no. 4, pp , 21. [17] B. Guo, H. K. L, C. Zhou, Y. Cheng, Analyss of General Network Codng Condtons and Desgn of a Free-Rde-Orented Routng Metrc, IEEE Transactons on Vehcular Technology, 6(4), pp , 211. [18] S. Wang, A. Vaslakos, H. B. Jang, X. Q. Ma, Energy Effcent Broadcastng Usng Network Codng Aware Protocol n Wreless Ad Hoc Network[R], 211 IEEE Internatonal Conference on Communcatons(ICC),pp.1-5,211. [19] B. N, N. Santhapur, Z. Zhong, and S. Nelakudt. Routng wth opportunstcally coded exchanges n wreless mesh networks, Proc. IEEE WMesh, pp , 26. [2] Z. Yu, Y. W. We, B. Ramkumar, Y. Guan, An Effcent Sgnature-Based Scheme for Securng Network Codng Aganst Polluton Attacks, Proceedng of the IEEE Internatonal Conference on Computer Communcatons (INFOCOM), pp , 28. [21] D. Johnson, Y. Hu, and D. Maltz, The Dynamc Source Routng Protocol (DSR) for Moble Ad Hoc Networks for IPv4, IETF RFC 4728, / rfc/ rfc4728.txt, 29. [22] J. Wu, Extended Domnatng-Set-Based Routng n Ad Hoc Wreless Networks wth Undrectonal Lnks, IEEE Trans. Parallel and Dstrbuted Systems, 9(3),pp , 22. [23] S. Sengupta, S. Rayanchu, and S. Baneree, An Analyss of Wreless Network Codng for Uncast Sessons: The Case for Codng-Aware Routng, Proceedng of the IEEE IN FOCOM. Anchorage, AK, pp , 27. [24] P. Chaporkar and A. Proutere, Adaptve network codng and schedulng for maxmzng throughput n wreless networks, n Proceedng of the Annual ACM Int l. Conference on Moble Computng & Networkng(MobCom). Montr eal, Canada, pp , 27 [25] A. Khreshah, C.-C. Wang, and N.B. Shroff, Cross-layer Optmzaton for Wreless Multhop Networks wth Parwse Intersesson Network Codng, IEEE Journal on Selected Areas n Communcatons, 27(5), pp , 29 [26] T. Cu, L. Chen, and T. Ho, "Energy Effcent Opportunstc Network Codng for Wreless Networks," Proceedng of the IEEE Internatonal Conference on Computer Communcatons (INFOCOM). pp , 28 [27] S. H. Yang, J. Wu, and C. Mhaela, "Effcent broadcast n MANETs usng network codng and drectonal antennas,"proceedng of the IEEE Internatonal Conference on Computer Communcatons (INFOCOM). pp , 28. [28] L. L, et al. "Network codng-based broadcast n moble ad-hoc networks," Proceedng of the IEEE Internatonal Conference on Computer Communcatons (INFOCOM). pp , 27. [29] A. Khreshah, et al. "Flow-based xor network codng for lossy wreless networks," IEEE Transactons on Wreless Communcatons, 11(6), pp , 212.

11 Jng Chen receved the BS degree n computer scence n 23 from Wuhan Unversty of Technology. He also receved hs Ph.D degree n computer scence n 28 from Huazhong Unversty of Scence and Technology, Wuhan, Chna. He s an assocate professor at the Computer School, Wuhan Unversty. Hs research nterests nclude network securty, wreless networks, and moble computng. Kun He receved the MS degree n computer scence n 211 from Wuhan Unversty, Wuhan, Chna. He s a Ph.D student of Wuhan Unversty. Hs research nterests nclude network securty, and moble computng. Ruyng Du receved the BS, MS, and Ph.D degrees n computer scence n 1987, 1994 and 28, from Wuhan Unversty, Wuhan, Chna. She s a professor at the Computer School, Wuhan Unversty. Her research nterests nclude network securty, wreless network, and moble computng. Mnghu Zheng receved the BS degree n Appled Mathematcs from Hube nsttute for Natonaltes n 1995, and receved hs MS and Ph.D degree n Informaton Securty from Huazhong Unversty of Scence & Technology, Chna, n 24 and 28 respectvely. He s a professor at Hube Insttute for Natonaltes. Hs research nterests nclude cryptography, securty protocols, and network securty. Yang Xang s a full professor at the School of Informaton Technology, Deakn Unversty. He s the Drector of the Network Securty and Computng Lab (NSCLab). Hs research nterests nclude network and system securty, dstrbuted systems, and networkng. He s the Chef Investgator of several proects n network and system securty, funded by the Australan Research Councl (ARC). He has publshed more than 13 research papers n many nternatonal ournals and conferences, such as IEEE Transactons on Computers, IEEE Transactons on Parallel and Dstrbuted Systems, IEEE Transactons on Informaton Securty and Forenscs, and IEEE Journal on Selected Areas n Communcatons. Two of hs papers were selected as the featured artcles n the Aprl 29 and the July 213 ssues of IEEE Transactons on Parallel and Dstrbuted Systems. He has served as the Program/General Char for many nternatonal conferences such as ICA3PP 12/11, IEEE/IFIP EUC 11, IEEE TrustCom 13/11, IEEE HPCC 1/9, IEEE ICPADS 8, and NSS 11/1/9/8/7. He serves as the Assocate Edtor of IEEE Transactons on Computers, Securty and Communcaton Networks (Wley), and s the Edtor of the Journal of Network and Computer Applcatons. Quan Yuan s an Assstant Professor at the Department of Math and Computer Scence, Unversty of Texas-Perman Basn, TX, USA. Hs research nterests nclude moble computng, routng protocols, peer-to-peer computng, parallel and dstrbuted systems, and computer networks.

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and

More information

Efficient Distributed File System (EDFS)

Efficient Distributed File System (EDFS) Effcent Dstrbuted Fle System (EDFS) (Sem-Centralzed) Debessay(Debsh) Fesehaye, Rahul Malk & Klara Naherstedt Unversty of Illnos-Urbana Champagn Contents Problem Statement, Related Work, EDFS Desgn Rate

More information

Network Coding as a Dynamical System

Network Coding as a Dynamical System Network Codng as a Dynamcal System Narayan B. Mandayam IEEE Dstngushed Lecture (jont work wth Dan Zhang and a Su) Department of Electrcal and Computer Engneerng Rutgers Unversty Outlne. Introducton 2.

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

Constructing Minimum Connected Dominating Set: Algorithmic approach

Constructing Minimum Connected Dominating Set: Algorithmic approach Constructng Mnmum Connected Domnatng Set: Algorthmc approach G.N. Puroht and Usha Sharma Centre for Mathematcal Scences, Banasthal Unversty, Rajasthan 304022 usha.sharma94@yahoo.com Abstract: Connected

More information

Private Information Retrieval (PIR)

Private Information Retrieval (PIR) 2 Levente Buttyán Problem formulaton Alce wants to obtan nformaton from a database, but she does not want the database to learn whch nformaton she wanted e.g., Alce s an nvestor queryng a stock-market

More information

Load-Balanced Anycast Routing

Load-Balanced Anycast Routing Load-Balanced Anycast Routng Chng-Yu Ln, Jung-Hua Lo, and Sy-Yen Kuo Department of Electrcal Engneerng atonal Tawan Unversty, Tape, Tawan sykuo@cc.ee.ntu.edu.tw Abstract For fault-tolerance and load-balance

More information

Minimum Cost Optimization of Multicast Wireless Networks with Network Coding

Minimum Cost Optimization of Multicast Wireless Networks with Network Coding Mnmum Cost Optmzaton of Multcast Wreless Networks wth Network Codng Chengyu Xong and Xaohua L Department of ECE, State Unversty of New York at Bnghamton, Bnghamton, NY 13902 Emal: {cxong1, xl}@bnghamton.edu

More information

Relative Link Quality Assessment and Hybrid Routing Scheme for Wireless Mesh Networks

Relative Link Quality Assessment and Hybrid Routing Scheme for Wireless Mesh Networks Relatve Lnk Qualty Assessment and Hybrd Routng Scheme for Wreless Mesh Networks ChaoY Ban, Xn Jn, Chao Lu, XaoMng L, YAN We Insttute of Networkng Computng and Informaton System Pekng Unversty, P.R.Chna

More information

Load Balancing for Hex-Cell Interconnection Network

Load Balancing for Hex-Cell Interconnection Network Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,

More information

Cost-Effective Lifetime Prediction Based Routing Protocol for Wireless Network

Cost-Effective Lifetime Prediction Based Routing Protocol for Wireless Network Cost-Effectve Lfetme Predcton Based Routng Protocol for Wreless Network ABU MD. ZAFOR ALAM, MUHAMMAD ARIFUR RAHMAN, MOHAMMED ABUL HASAN 2,M. LUTFAR RAHMAN Faculty of Scence and IT, Daffodl Internatonal

More information

Positive Semi-definite Programming Localization in Wireless Sensor Networks

Positive Semi-definite Programming Localization in Wireless Sensor Networks Postve Sem-defnte Programmng Localzaton n Wreless Sensor etworks Shengdong Xe 1,, Jn Wang, Aqun Hu 1, Yunl Gu, Jang Xu, 1 School of Informaton Scence and Engneerng, Southeast Unversty, 10096, anjng Computer

More information

QoS-aware routing for heterogeneous layered unicast transmissions in wireless mesh networks with cooperative network coding

QoS-aware routing for heterogeneous layered unicast transmissions in wireless mesh networks with cooperative network coding Tarno et al. EURASIP Journal on Wreless Communcatons and Networkng 214, 214:81 http://wcn.euraspournals.com/content/214/1/81 RESEARCH Open Access QoS-aware routng for heterogeneous layered uncast transmssons

More information

Simulation Based Analysis of FAST TCP using OMNET++

Simulation Based Analysis of FAST TCP using OMNET++ Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT

DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT Bran J. Wolf, Joseph L. Hammond, and Harlan B. Russell Dept. of Electrcal and Computer Engneerng, Clemson Unversty,

More information

Delay Variation Optimized Traffic Allocation Based on Network Calculus for Multi-path Routing in Wireless Mesh Networks

Delay Variation Optimized Traffic Allocation Based on Network Calculus for Multi-path Routing in Wireless Mesh Networks Appl. Math. Inf. Sc. 7, No. 2L, 467-474 2013) 467 Appled Mathematcs & Informaton Scences An Internatonal Journal http://dx.do.org/10.12785/ams/072l13 Delay Varaton Optmzed Traffc Allocaton Based on Network

More information

Online Policies for Opportunistic Virtual MISO Routing in Wireless Ad Hoc Networks

Online Policies for Opportunistic Virtual MISO Routing in Wireless Ad Hoc Networks 12 IEEE Wreless Communcatons and Networkng Conference: Moble and Wreless Networks Onlne Polces for Opportunstc Vrtual MISO Routng n Wreless Ad Hoc Networks Crstano Tapparello, Stefano Tomasn and Mchele

More information

A Low-Overhead Routing Protocol for Ad Hoc Networks with selfish nodes

A Low-Overhead Routing Protocol for Ad Hoc Networks with selfish nodes A Low-Oerhead Routng Protocol for Ad Hoc Networks wth selfsh nodes Dongbn Wang 1, Xaofeng Wang 2, Xangzhan Yu 3, Kacheng Q 1, Zhbn Xa 1 1 School of Software Engneerng, Bejng Unersty of Posts and Telecommuncatons,100876,

More information

THere are increasing interests and use of mobile ad hoc

THere are increasing interests and use of mobile ad hoc 1 Adaptve Schedulng n MIMO-based Heterogeneous Ad hoc Networks Shan Chu, Xn Wang Member, IEEE, and Yuanyuan Yang Fellow, IEEE. Abstract The demands for data rate and transmsson relablty constantly ncrease

More information

MobileGrid: Capacity-aware Topology Control in Mobile Ad Hoc Networks

MobileGrid: Capacity-aware Topology Control in Mobile Ad Hoc Networks MobleGrd: Capacty-aware Topology Control n Moble Ad Hoc Networks Jle Lu, Baochun L Department of Electrcal and Computer Engneerng Unversty of Toronto {jenne,bl}@eecg.toronto.edu Abstract Snce wreless moble

More information

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision SLAM Summer School 2006 Practcal 2: SLAM usng Monocular Vson Javer Cvera, Unversty of Zaragoza Andrew J. Davson, Imperal College London J.M.M Montel, Unversty of Zaragoza. josemar@unzar.es, jcvera@unzar.es,

More information

HCOR: a high-throughput coding-aware opportunistic routing for inter-flow network coding in wireless mesh networks

HCOR: a high-throughput coding-aware opportunistic routing for inter-flow network coding in wireless mesh networks Ha et al. EURASIP Journal on Wreless Communcatonsand Networkng 2014, 2014:148 http://jwcn.euraspjournals.com/content/2014/1/148 RESEARCH Open Access HCOR: a hgh-throughput codng-aware opportunstc routng

More information

DEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS

DEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS DEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS Arun Avudanayagam Yuguang Fang Wenjng Lou Department of Electrcal and Computer Engneerng Unversty of Florda Ganesvlle, FL 3261

More information

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique //00 :0 AM Outlne and Readng The Greedy Method The Greedy Method Technque (secton.) Fractonal Knapsack Problem (secton..) Task Schedulng (secton..) Mnmum Spannng Trees (secton.) Change Money Problem Greedy

More information

Related-Mode Attacks on CTR Encryption Mode

Related-Mode Attacks on CTR Encryption Mode Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory

More information

Efficient Content Distribution in Wireless P2P Networks

Efficient Content Distribution in Wireless P2P Networks Effcent Content Dstrbuton n Wreless P2P Networs Qong Sun, Vctor O. K. L, and Ka-Cheong Leung Department of Electrcal and Electronc Engneerng The Unversty of Hong Kong Pofulam Road, Hong Kong, Chna {oansun,

More information

Cluster Analysis of Electrical Behavior

Cluster Analysis of Electrical Behavior Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School

More information

IJCTA Nov-Dec 2016 Available

IJCTA Nov-Dec 2016 Available Dr K Santh et al, Internatonal Journal of Computer Technology & Applcatons,Vol 7(6),773-779 Optmzed Route Technque for DSR Routng Protocol n MANET Dr.K.Santh, Assocate Professor, Dept. of Computer Scence,

More information

Adaptive Energy and Location Aware Routing in Wireless Sensor Network

Adaptive Energy and Location Aware Routing in Wireless Sensor Network Adaptve Energy and Locaton Aware Routng n Wreless Sensor Network Hong Fu 1,1, Xaomng Wang 1, Yngshu L 1 Department of Computer Scence, Shaanx Normal Unversty, X an, Chna, 71006 fuhong433@gmal.com {wangxmsnnu@hotmal.cn}

More information

Video Proxy System for a Large-scale VOD System (DINA)

Video Proxy System for a Large-scale VOD System (DINA) Vdeo Proxy System for a Large-scale VOD System (DINA) KWUN-CHUNG CHAN #, KWOK-WAI CHEUNG *# #Department of Informaton Engneerng *Centre of Innovaton and Technology The Chnese Unversty of Hong Kong SHATIN,

More information

Long Lifetime Routing in Unreliable Wireless Sensor Networks

Long Lifetime Routing in Unreliable Wireless Sensor Networks 211 Internatonal Conference on Networkng, Sensng and Control Delft, the Netherlands, 11-13 Aprl 211 Long Lfetme Routng n Unrelable Wreless Sensor Networks Hamed Yousef, Mohammad Hossen Yeganeh, Al Movaghar

More information

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour 6.854 Advanced Algorthms Petar Maymounkov Problem Set 11 (November 23, 2005) Wth: Benjamn Rossman, Oren Wemann, and Pouya Kheradpour Problem 1. We reduce vertex cover to MAX-SAT wth weghts, such that the

More information

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory Background EECS. Operatng System Fundamentals No. Vrtual Memory Prof. Hu Jang Department of Electrcal Engneerng and Computer Scence, York Unversty Memory-management methods normally requres the entre process

More information

Virtual Machine Migration based on Trust Measurement of Computer Node

Virtual Machine Migration based on Trust Measurement of Computer Node Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on

More information

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster

More information

Efficient Load-Balanced IP Routing Scheme Based on Shortest Paths in Hose Model. Eiji Oki May 28, 2009 The University of Electro-Communications

Efficient Load-Balanced IP Routing Scheme Based on Shortest Paths in Hose Model. Eiji Oki May 28, 2009 The University of Electro-Communications Effcent Loa-Balance IP Routng Scheme Base on Shortest Paths n Hose Moel E Ok May 28, 2009 The Unversty of Electro-Communcatons Ok Lab. Semnar, May 28, 2009 1 Outlne Backgroun on IP routng IP routng strategy

More information

Analysis of Collaborative Distributed Admission Control in x Networks

Analysis of Collaborative Distributed Admission Control in x Networks 1 Analyss of Collaboratve Dstrbuted Admsson Control n 82.11x Networks Thnh Nguyen, Member, IEEE, Ken Nguyen, Member, IEEE, Lnha He, Member, IEEE, Abstract Wth the recent surge of wreless home networks,

More information

IR-HARQ vs. Joint Channel-Network coding for Cooperative Wireless Communication

IR-HARQ vs. Joint Channel-Network coding for Cooperative Wireless Communication Cyber Journals: ultdscplnary Journals n Scence and Technology, Journal of Selected Areas n Telecommuncatons (JSAT), August Edton, 2 IR-HARQ vs. Jont Channel-Network codng for Cooperatve Wreless Communcaton

More information

EFT: a high throughput routing metric for IEEE s wireless mesh networks

EFT: a high throughput routing metric for IEEE s wireless mesh networks Ann. Telecommun. (2010) 65:247 262 DOI 10.1007/s12243-009-0130-1 EFT: a hgh throughput routng metrc for IEEE 802.11s wreless mesh networks Md. Sharful Islam Muhammad Mahbub Alam Md. Abdul Hamd Choong Seon

More information

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty

More information

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.15 No.10, October 2015 1 Evaluaton of an Enhanced Scheme for Hgh-level Nested Network Moblty Mohammed Babker Al Mohammed, Asha Hassan.

More information

Research of Dynamic Access to Cloud Database Based on Improved Pheromone Algorithm

Research of Dynamic Access to Cloud Database Based on Improved Pheromone Algorithm , pp.197-202 http://dx.do.org/10.14257/dta.2016.9.5.20 Research of Dynamc Access to Cloud Database Based on Improved Pheromone Algorthm Yongqang L 1 and Jn Pan 2 1 (Software Technology Vocatonal College,

More information

Overview. Basic Setup [9] Motivation and Tasks. Modularization 2008/2/20 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION

Overview. Basic Setup [9] Motivation and Tasks. Modularization 2008/2/20 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION Overvew 2 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION Introducton Mult- Smulator MASIM Theoretcal Work and Smulaton Results Concluson Jay Wagenpfel, Adran Trachte Motvaton and Tasks Basc Setup

More information

Using Particle Swarm Optimization for Enhancing the Hierarchical Cell Relay Routing Protocol

Using Particle Swarm Optimization for Enhancing the Hierarchical Cell Relay Routing Protocol 2012 Thrd Internatonal Conference on Networkng and Computng Usng Partcle Swarm Optmzaton for Enhancng the Herarchcal Cell Relay Routng Protocol Hung-Y Ch Department of Electrcal Engneerng Natonal Sun Yat-Sen

More information

Routing in Degree-constrained FSO Mesh Networks

Routing in Degree-constrained FSO Mesh Networks Internatonal Journal of Hybrd Informaton Technology Vol., No., Aprl, 009 Routng n Degree-constraned FSO Mesh Networks Zpng Hu, Pramode Verma, and James Sluss Jr. School of Electrcal & Computer Engneerng

More information

Performance analysis of distributed cluster-based MAC protocol for multiuser MIMO wireless networks

Performance analysis of distributed cluster-based MAC protocol for multiuser MIMO wireless networks RESEARCH Open Access Performance analyss of dstrbuted cluster-based MAC protocol for multuser MIMO wreless networks Azadeh Ettefagh *, Marc Kuhn, Celal Eşl and Armn Wttneben Abstract It s known that multuser

More information

Proper Choice of Data Used for the Estimation of Datum Transformation Parameters

Proper Choice of Data Used for the Estimation of Datum Transformation Parameters Proper Choce of Data Used for the Estmaton of Datum Transformaton Parameters Hakan S. KUTOGLU, Turkey Key words: Coordnate systems; transformaton; estmaton, relablty. SUMMARY Advances n technologes and

More information

ARTICLE IN PRESS. Signal Processing: Image Communication

ARTICLE IN PRESS. Signal Processing: Image Communication Sgnal Processng: Image Communcaton 23 (2008) 754 768 Contents lsts avalable at ScenceDrect Sgnal Processng: Image Communcaton journal homepage: www.elsever.com/locate/mage Dstrbuted meda rate allocaton

More information

Improved Resource Allocation Algorithms for Practical Image Encoding in a Ubiquitous Computing Environment

Improved Resource Allocation Algorithms for Practical Image Encoding in a Ubiquitous Computing Environment JOURNAL OF COMPUTERS, VOL. 4, NO. 9, SEPTEMBER 2009 873 Improved Resource Allocaton Algorthms for Practcal Image Encodng n a Ubqutous Computng Envronment Manxong Dong, Long Zheng, Kaoru Ota, Song Guo School

More information

A Distributed Dynamic Bandwidth Allocation Algorithm in EPON

A Distributed Dynamic Bandwidth Allocation Algorithm in EPON www.ccsenet.org/mas Modern Appled Scence Vol. 4, o. 7; July 2010 A Dstrbuted Dynamc Bandwdth Allocaton Algorthm n EPO Feng Cao, Demng Lu, Mnmng Zhang, Kang Yang & Ynbo Qan School of Optoelectronc Scence

More information

ENERGY EFFICIENT ROUTING PROTOCOLS FOR WIRELESS AD HOC NETWORKS A SURVEY

ENERGY EFFICIENT ROUTING PROTOCOLS FOR WIRELESS AD HOC NETWORKS A SURVEY K SANKAR: ENERGY EFFICIENT ROUTING PROTOCOLS FOR WIRELESS AD HOC NETWORKS A SURVEY ENERGY EFFICIENT ROUTING PROTOCOLS FOR WIRELESS AD HOC NETWORKS A SURVEY K. Sankar Department of Computer Scence and Engneerng,

More information

Performance Improvement of Direct Diffusion Algorithm in Sensor Networks

Performance Improvement of Direct Diffusion Algorithm in Sensor Networks Mddle-East Journal of Scentfc Research 2 (): 566-574, 202 ISSN 990-9233 IDOSI Publcatons, 202 DOI: 0.5829/dos.mejsr.202.2..43 Performance Improvement of Drect Dffuson Algorthm n Sensor Networks Akbar Bemana

More information

RAP. Speed/RAP/CODA. Real-time Systems. Modeling the sensor networks. Real-time Systems. Modeling the sensor networks. Real-time systems:

RAP. Speed/RAP/CODA. Real-time Systems. Modeling the sensor networks. Real-time Systems. Modeling the sensor networks. Real-time systems: Speed/RAP/CODA Presented by Octav Chpara Real-tme Systems Many wreless sensor network applcatons requre real-tme support Survellance and trackng Border patrol Fre fghtng Real-tme systems: Hard real-tme:

More information

Analysis on the Workspace of Six-degrees-of-freedom Industrial Robot Based on AutoCAD

Analysis on the Workspace of Six-degrees-of-freedom Industrial Robot Based on AutoCAD Analyss on the Workspace of Sx-degrees-of-freedom Industral Robot Based on AutoCAD Jn-quan L 1, Ru Zhang 1,a, Fang Cu 1, Q Guan 1 and Yang Zhang 1 1 School of Automaton, Bejng Unversty of Posts and Telecommuncatons,

More information

An Improved Image Segmentation Algorithm Based on the Otsu Method

An Improved Image Segmentation Algorithm Based on the Otsu Method 3th ACIS Internatonal Conference on Software Engneerng, Artfcal Intellgence, Networkng arallel/dstrbuted Computng An Improved Image Segmentaton Algorthm Based on the Otsu Method Mengxng Huang, enjao Yu,

More information

Performance Comparison of a QoS Aware Routing Protocol for Wireless Sensor Networks

Performance Comparison of a QoS Aware Routing Protocol for Wireless Sensor Networks Communcatons and Network, 2016, 8, 45-55 Publshed Onlne February 2016 n ScRes. http://www.scrp.org/journal/cn http://dx.do.org/10.4236/cn.2016.81006 Performance Comparson of a QoS Aware Routng Protocol

More information

The Impact of Delayed Acknowledgement on E-TCP Performance In Wireless networks

The Impact of Delayed Acknowledgement on E-TCP Performance In Wireless networks The mpact of Delayed Acknoledgement on E-TCP Performance n Wreless netorks Deddy Chandra and Rchard J. Harrs School of Electrcal and Computer System Engneerng Royal Melbourne nsttute of Technology Melbourne,

More information

Cost-Effective Lifetime Prediction Based Routing Protocol for Mobile Ad Hoc Network

Cost-Effective Lifetime Prediction Based Routing Protocol for Mobile Ad Hoc Network Cost-Effectve Lfetme Predcton Based Routng Protocol for Moble Ad Hoc Network ABU MD. ZAFOR ALAM, MUHAMMAD ARIFUR RAHMAN, M. LUTFAR RAHMAN 1 Faculty of Scence and Informaton Technology, Daffodl Internatonal

More information

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS ARPN Journal of Engneerng and Appled Scences 006-017 Asan Research Publshng Network (ARPN). All rghts reserved. NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS Igor Grgoryev, Svetlana

More information

Non-Split Restrained Dominating Set of an Interval Graph Using an Algorithm

Non-Split Restrained Dominating Set of an Interval Graph Using an Algorithm Internatonal Journal of Advancements n Research & Technology, Volume, Issue, July- ISS - on-splt Restraned Domnatng Set of an Interval Graph Usng an Algorthm ABSTRACT Dr.A.Sudhakaraah *, E. Gnana Deepka,

More information

A Semi-Distributed Load Balancing Architecture and Algorithm for Heterogeneous Wireless Networks

A Semi-Distributed Load Balancing Architecture and Algorithm for Heterogeneous Wireless Networks A Sem-Dstrbuted oad Balancng Archtecture and Algorthm for Heterogeneous reless Networks Md. Golam Rabul Ala Choong Seon Hong * Kyung Hee Unversty, Korea rob@networkng.khu.ac.kr, cshong@khu.ac.kr Abstract

More information

For instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1)

For instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1) Secton 1.2 Subsets and the Boolean operatons on sets If every element of the set A s an element of the set B, we say that A s a subset of B, or that A s contaned n B, or that B contans A, and we wrte A

More information

Query Clustering Using a Hybrid Query Similarity Measure

Query Clustering Using a Hybrid Query Similarity Measure Query clusterng usng a hybrd query smlarty measure Fu. L., Goh, D.H., & Foo, S. (2004). WSEAS Transacton on Computers, 3(3), 700-705. Query Clusterng Usng a Hybrd Query Smlarty Measure Ln Fu, Don Hoe-Lan

More information

CS 268: Lecture 8 Router Support for Congestion Control

CS 268: Lecture 8 Router Support for Congestion Control CS 268: Lecture 8 Router Support for Congeston Control Ion Stoca Computer Scence Dvson Department of Electrcal Engneerng and Computer Scences Unversty of Calforna, Berkeley Berkeley, CA 9472-1776 Router

More information

Bayesian Model for Mobility Prediction to Support Routing in Mobile Ad-Hoc Networks

Bayesian Model for Mobility Prediction to Support Routing in Mobile Ad-Hoc Networks Bayesan Model for Moblty Predcton to Support Routng n Moble Ad-Hoc Networks Tran The Son, Hoa Le Mnh, Graham Sexton, Nauman Aslam, Zabh Ghassemlooy Northumbra Communcatons Research Laboratory (NCRLab Faculty

More information

Dynamic Bandwidth Provisioning with Fairness and Revenue Considerations for Broadband Wireless Communication

Dynamic Bandwidth Provisioning with Fairness and Revenue Considerations for Broadband Wireless Communication Ths full text paper was peer revewed at the drecton of IEEE Communcatons Socety subject matter experts for publcaton n the ICC 008 proceedngs. Dynamc Bandwdth Provsonng wth Farness and Revenue Consderatons

More information

Wishing you all a Total Quality New Year!

Wishing you all a Total Quality New Year! Total Qualty Management and Sx Sgma Post Graduate Program 214-15 Sesson 4 Vnay Kumar Kalakband Assstant Professor Operatons & Systems Area 1 Wshng you all a Total Qualty New Year! Hope you acheve Sx sgma

More information

Reducing Frame Rate for Object Tracking

Reducing Frame Rate for Object Tracking Reducng Frame Rate for Object Trackng Pavel Korshunov 1 and We Tsang Oo 2 1 Natonal Unversty of Sngapore, Sngapore 11977, pavelkor@comp.nus.edu.sg 2 Natonal Unversty of Sngapore, Sngapore 11977, oowt@comp.nus.edu.sg

More information

OPTIMAL CONFIGURATION FOR NODES IN MIXED CELLULAR AND MOBILE AD HOC NETWORK FOR INET

OPTIMAL CONFIGURATION FOR NODES IN MIXED CELLULAR AND MOBILE AD HOC NETWORK FOR INET OPTIMAL CONFIGURATION FOR NODE IN MIED CELLULAR AND MOBILE AD HOC NETWORK FOR INET Olusola Babalola D.E. Department of Electrcal and Computer Engneerng Morgan tate Unversty Dr. Rchard Dean Faculty Advsor

More information

Efficient Routing Algorithm Based on Decisionmaking Sequence in Wireless Mesh Networks

Efficient Routing Algorithm Based on Decisionmaking Sequence in Wireless Mesh Networks 502 JOURNAL OF NETWORKS, VOL. 7, NO. 3, MARCH 2012 Effcent Routng Algorthm Based on Decsonmang Sequence n Wreless Mesh Networs Yngyng Qn, Rongbo Zhu * College of Computer Scence, South-Central Unversty

More information

Relational Analysis based Concurrent Multipath Transfer over Heterogeneous Vehicular Networks

Relational Analysis based Concurrent Multipath Transfer over Heterogeneous Vehicular Networks www.ijcsi.org 1 Relatonal Analyss based Concurrent Multpath Transfer over Heterogeneous Vehcular Networks Yuanlong Cao 1, Changqao Xu 1,2, Janfeng Guan 1, Ja Zhao 3, We Quan 1, Mngchuan Zhang 1 and Hongke

More information

An Application of the Dulmage-Mendelsohn Decomposition to Sparse Null Space Bases of Full Row Rank Matrices

An Application of the Dulmage-Mendelsohn Decomposition to Sparse Null Space Bases of Full Row Rank Matrices Internatonal Mathematcal Forum, Vol 7, 2012, no 52, 2549-2554 An Applcaton of the Dulmage-Mendelsohn Decomposton to Sparse Null Space Bases of Full Row Rank Matrces Mostafa Khorramzadeh Department of Mathematcal

More information

3. CR parameters and Multi-Objective Fitness Function

3. CR parameters and Multi-Objective Fitness Function 3 CR parameters and Mult-objectve Ftness Functon 41 3. CR parameters and Mult-Objectve Ftness Functon 3.1. Introducton Cogntve rados dynamcally confgure the wreless communcaton system, whch takes beneft

More information

Optimizing Document Scoring for Query Retrieval

Optimizing Document Scoring for Query Retrieval Optmzng Document Scorng for Query Retreval Brent Ellwen baellwe@cs.stanford.edu Abstract The goal of ths project was to automate the process of tunng a document query engne. Specfcally, I used machne learnng

More information

A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid Wireless Networks

A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid Wireless Networks Ths artcle has been accepted for publcaton n a future ssue of ths journal, but has not been fully edted. Content may change pror to fnal publcaton. Ctaton nformaton: DOI.9/TMC.25.2388476, IEEE Transactons

More information

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,

More information

An efficient iterative source routing algorithm

An efficient iterative source routing algorithm An effcent teratve source routng algorthm Gang Cheng Ye Tan Nrwan Ansar Advanced Networng Lab Department of Electrcal Computer Engneerng New Jersey Insttute of Technology Newar NJ 7 {gc yt Ansar}@ntedu

More information

AUTONOMOUS ROUTING ALGORITHMS FOR NETWORKS WITH WIDE-SPREAD FAILURES

AUTONOMOUS ROUTING ALGORITHMS FOR NETWORKS WITH WIDE-SPREAD FAILURES AUTONOMOUS ROUTNG ALGORTHMS FOR NETWORKS WTH WDE-SPREAD FALURES Wajahat Khan, Long Bao Le and Eytan Modano Communcatons and Networkng Research Group Massachusetts nsttute of Technology Cambrdge, MA, USA

More information

Mobility Based Routing Protocol with MAC Collision Improvement in Vehicular Ad Hoc Networks

Mobility Based Routing Protocol with MAC Collision Improvement in Vehicular Ad Hoc Networks Moblty Based Routng Protocol wth MAC Collson Improvement n Vehcular Ad Hoc Networks Zhhao Dng, Pny Ren, Qnghe Du Shaanx Smart Networks and Ubqutous Access Rearch Center School of Electronc and Informaton

More information

Meta-heuristics for Multidimensional Knapsack Problems

Meta-heuristics for Multidimensional Knapsack Problems 2012 4th Internatonal Conference on Computer Research and Development IPCSIT vol.39 (2012) (2012) IACSIT Press, Sngapore Meta-heurstcs for Multdmensonal Knapsack Problems Zhbao Man + Computer Scence Department,

More information

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Proceedngs of the Wnter Smulaton Conference M E Kuhl, N M Steger, F B Armstrong, and J A Jones, eds A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Mark W Brantley Chun-Hung

More information

FAHP and Modified GRA Based Network Selection in Heterogeneous Wireless Networks

FAHP and Modified GRA Based Network Selection in Heterogeneous Wireless Networks 2017 2nd Internatonal Semnar on Appled Physcs, Optoelectroncs and Photoncs (APOP 2017) ISBN: 978-1-60595-522-3 FAHP and Modfed GRA Based Network Selecton n Heterogeneous Wreless Networks Xaohan DU, Zhqng

More information

Parallel matrix-vector multiplication

Parallel matrix-vector multiplication Appendx A Parallel matrx-vector multplcaton The reduced transton matrx of the three-dmensonal cage model for gel electrophoress, descrbed n secton 3.2, becomes excessvely large for polymer lengths more

More information

QoS Bandwidth Estimation Scheme for Delay Sensitive Applications in MANETs

QoS Bandwidth Estimation Scheme for Delay Sensitive Applications in MANETs Communcatons and Network, 2013, 5, 1-8 http://dx.do.org/10.4236/cn.2013.51001 Publshed Onlne February 2013 (http://www.scrp.org/journal/cn) QoS Bandwdth Estmaton Scheme for Delay Senstve Applcatons n MANETs

More information

Utility Constrained Energy Minimization In Aloha Networks

Utility Constrained Energy Minimization In Aloha Networks Utlty Constraned Energy nmzaton In Aloha Networks Amrmahd Khodaan, Babak H. Khalaj, ohammad S. Taleb Electrcal Engneerng Department Sharf Unversty of Technology Tehran, Iran khodaan@ee.shrf.edu, khalaj@sharf.edu,

More information

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task Proceedngs of NTCIR-6 Workshop Meetng, May 15-18, 2007, Tokyo, Japan Term Weghtng Classfcaton System Usng the Ch-square Statstc for the Classfcaton Subtask at NTCIR-6 Patent Retreval Task Kotaro Hashmoto

More information

A Topology-aware Random Walk

A Topology-aware Random Walk A Topology-aware Random Walk Inkwan Yu, Rchard Newman Dept. of CISE, Unversty of Florda, Ganesvlle, Florda, USA Abstract When a graph can be decomposed nto clusters of well connected subgraphs, t s possble

More information

Connection-information-based connection rerouting for connection-oriented mobile communication networks

Connection-information-based connection rerouting for connection-oriented mobile communication networks Dstrb. Syst. Engng 5 (1998) 47 65. Prnted n the UK PII: S0967-1846(98)90513-7 Connecton-nformaton-based connecton reroutng for connecton-orented moble communcaton networks Mnho Song, Yanghee Cho and Chongsang

More information

A KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE

A KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE A KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE 1 TAO LIU, 2 JI-JUN XU 1 College of Informaton Scence and Technology, Zhengzhou Normal Unversty, Chna 2 School of Mathematcs

More information

Ad Hoc Networks 11 (2013) Contents lists available at SciVerse ScienceDirect. Ad Hoc Networks

Ad Hoc Networks 11 (2013) Contents lists available at SciVerse ScienceDirect. Ad Hoc Networks Ad Hoc Networks 11 (213) 1136 1149 Contents lsts avalable at ScVerse ScenceDrect Ad Hoc Networks journal homepage: www.elsever.com/locate/adhoc Generc predcton asssted sngle-copy routng n underwater delay

More information

A Fair Access Mechanism Based on TXOP in IEEE e Wireless Networks

A Fair Access Mechanism Based on TXOP in IEEE e Wireless Networks 11 Internatonal Journal of Communcaton Networks and Informaton Securty (IJCNIS) Vol. 8, No. 1, Aprl 16 A Far Access Mechansm Based on TXOP n IEEE 8.11e Wreless Networks Marjan Yazdan 1, Maryam Kamal, Neda

More information

Evaluation of Parallel Processing Systems through Queuing Model

Evaluation of Parallel Processing Systems through Queuing Model ISSN 2278-309 Vkas Shnde, Internatonal Journal of Advanced Volume Trends 4, n Computer No.2, March Scence - and Aprl Engneerng, 205 4(2), March - Aprl 205, 36-43 Internatonal Journal of Advanced Trends

More information

Scheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research

Scheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research Schedulng Remote Access to Scentfc Instruments n Cybernfrastructure for Educaton and Research Je Yn 1, Junwe Cao 2,3,*, Yuexuan Wang 4, Lanchen Lu 1,3 and Cheng Wu 1,3 1 Natonal CIMS Engneerng and Research

More information

Mobile Adaptive Distributed Clustering Algorithm for Wireless Sensor Networks

Mobile Adaptive Distributed Clustering Algorithm for Wireless Sensor Networks Internatonal Journal of Computer Applcatons (975 8887) Volume No.7, Aprl Moble Adaptve Dstrbuted Clusterng Algorthm for Wreless Sensor Networks S.V.Mansekaran Department of Informaton Technology Anna Unversty

More information

Research Article Information Transmission Probability and Cache Management Method in Opportunistic Networks

Research Article Information Transmission Probability and Cache Management Method in Opportunistic Networks Wreless Communcatons and Moble Computng Volume 2018, Artcle ID 1571974, 9 pages https://do.org/10.1155/2018/1571974 Research Artcle Informaton Transmsson Probablty and Cache Management Method n Opportunstc

More information

EECS 730 Introduction to Bioinformatics Sequence Alignment. Luke Huan Electrical Engineering and Computer Science

EECS 730 Introduction to Bioinformatics Sequence Alignment. Luke Huan Electrical Engineering and Computer Science EECS 730 Introducton to Bonformatcs Sequence Algnment Luke Huan Electrcal Engneerng and Computer Scence http://people.eecs.ku.edu/~huan/ HMM Π s a set of states Transton Probabltes a kl Pr( l 1 k Probablty

More information

Determining the Optimal Bandwidth Based on Multi-criterion Fusion

Determining the Optimal Bandwidth Based on Multi-criterion Fusion Proceedngs of 01 4th Internatonal Conference on Machne Learnng and Computng IPCSIT vol. 5 (01) (01) IACSIT Press, Sngapore Determnng the Optmal Bandwdth Based on Mult-crteron Fuson Ha-L Lang 1+, Xan-Mn

More information

Application of VCG in Replica Placement Strategy of Cloud Storage

Application of VCG in Replica Placement Strategy of Cloud Storage Internatonal Journal of Grd and Dstrbuted Computng, pp.27-40 http://dx.do.org/10.14257/jgdc.2016.9.4.03 Applcaton of VCG n Replca Placement Strategy of Cloud Storage Wang Hongxa Computer Department, Bejng

More information

An Efficient Garbage Collection for Flash Memory-Based Virtual Memory Systems

An Efficient Garbage Collection for Flash Memory-Based Virtual Memory Systems S. J and D. Shn: An Effcent Garbage Collecton for Flash Memory-Based Vrtual Memory Systems 2355 An Effcent Garbage Collecton for Flash Memory-Based Vrtual Memory Systems Seunggu J and Dongkun Shn, Member,

More information